Page 161 - Kaleidoscope Academic Conference Proceedings 2021
P. 161
Connecting physical and virtual worlds
4. TECHNOLOGY PLATFORM REFERENCES
Section 2, Figure 4 and Figure 5 outlined the immediate [1] World Economic Forum, Systems of Cyber
benefits of the freedom of visualization and navigation of Resilience: Secure and Trusted FinTech,
frameworks and their mappings. The technology platform https://www.weforum.org/reports/systems-of-
provides many other capabilities including the ability to cyber-resilience-secure-and-trusted-fintech.
create rulers and measure controls for different perspectives
such as efficacy and coverage. The technology provides the [2] Jacques Francoeur, “Unified Security Model – a
ability to easily conduct protection design analysis and make neutral integrated system approach to
the enhanced security design recommendations. cybersecurity.” International Telecommunication
Union Standardization, Study Group 17 Security,
5. CONCLUSION 2020.
The removal of the burden of visualization and navigation of [3] Jacques Francoeur, “Protection Assurance for
any framework, combined with the ability to access the body Digital Currencies,” Focus Group on Digital
of knowledge with ease and from any reference framework, Currency including Digital Fiat Currency, ITU,
provides the capability to orchestrate security and 2019.
compliance as one. The removal of the burden allows for the
creation of an internal security control framework [4] Jacques Francoeur, “Protection Assurance Use
customised to the specific nature of what needs protection Case for Payment Transaction,” Focus Group on
and derived from the best available external knowledge. Digital Currency including Digital Fiat Currency
2019, ITU FG-DFC.
The technology platform also allows for current work habits
mentioned in Section 1 silos, allows for independent and [5] Jacques Francoeur, “Security Manual 2020,” ITU
asynchronous work to be conducted, yet all integrated in the Study Group 17 Security, Page 117, 2020.
back end. The sequential interdependency inherent in
expressions (Figure 9) defines a sequence of 1 through 5 [6] “Security Threats of Distributed Ledger
where larger numbered relationships are dependent on the Technology,” ITU Recommendations, 2019.
completion of smaller numbered relationships.
[7] “Security Framework for Distributed Ledger
The ability to make available the vast security knowledge in Technology,” ITU Recommendations, 2019.
expression form with an enabling technology to easily enable
novice practitioners around the world to consume, analyze, [8] ISO/IEC 27034-5-1 Application Security Series
and adapt is potentially transformational. Part 1-5, Application Security Control structure
using graphs in XML schema.
It is the intent of the author to publish technology code as an
open source “security control management system” for
community enhancement that can enable and support novice
security practitioners in the emerging world and least
developed countries.
– 99 –